Striking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step ahead of organisations, and even those with the most comprehensive security systems and controls in place find that an attacker will discover and exploit their Achilles Heel.
This session will provide practical steps to enable organisations to successfully implement industry recognised best practices and foundational security controls to secure IT systems and data against the most pervasive attacks. It will provide tips to successfully implement a strategy of least privilege, allowing you to eliminate unnecessary privileges and elevate rights across multi platforms and networked devices without hindering end-user productivity, firmly shutting the door on attackers.
During this informative session we’ll cover:
Click here to register and reserve your place.
Annie Bricker
Former Senior Editor for Computer News Middle East, Annie Bricker has been covering the MENA tech industry since 2013. She is a frequent contributor to global technology publications, and is often called upon to provide commentary and moderation on technology trends in the Middle East.
John Hathaway
Regional Vice President, BeyondTrust
John Hathaway is the Regional Vice President for BeyondTrust, a cyber security company focused on the protection of privileged credentials. He has over 19 years’ experience in information technology, software and cyber security, with the last 10 years based in the Middle East. John’s worked for system integrators, distributors and vendors and promises he’s more interesting in real life.
Michael Byrnes
Lead Solutions Engineer, Middle East and India, BeyondTrust
Michael Byrnes is the Lead Solutions Engineer for BeyondTrust Middle East and India. He has acquired a wealth of cyber security experience in a number of engagements over the last 10 years with a diverse set of enterprise across the Middle East.